Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure

被引:0
|
作者
Cao, Weiwei [1 ]
Hu, Lei [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
关键词
Multivariate public key encryption; internal perturbation; quadratic polynomial; differential attack; ALGORITHMS; MATSUMOTO;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, Wang et al proposed a new middle-field type scheme for multivariate public key encryption. There are three equations in the central map, so it is convenient to name it TH. They found that some linearization equations can be derived for TH and to overcome this defect, they combined the internal perturbation and plus methods to obtain an improved scheme which we call PTH+. They claimed that PTH+ can resist all known types of attacks, including differential attack, and to ensure it achieves a security level higher than 2(80), they suggested the parameter is taken as (l, r, m) = (47, 6, 11). In this paper, we show that TH has a much weaker structure than what is analyzed by the inventors and it can be totally cracked by linearization attack. For PTH+, we propose a method to reduce the attack against PTH+ to an attack on TH+ (a plus variant of TH) using the property on its differentials, which was originally regarded as impossible by that authors. The total complexity of our attack is 2(l+r+1)(2l)(w) approximate to 2(72), which is independent on the number m of the additional random quadratic equations by the plus method and disproves the claim in their original paper that the larger is the m, the securer is PTH+.
引用
收藏
页码:254 / 267
页数:14
相关论文
共 50 条
  • [1] Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure
    Cao Weiwei
    Hu Lei
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 511 - 515
  • [2] Cryptanalysis of an additively homomorphic public key encryption scheme
    Hong, Zhiyong
    Zhou, Liguo
    Zhan, Yu
    Liu, Chengdong
    Wang, Baocang
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [3] Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
    Albrecht, Martin R.
    Faugere, Jean-Charles
    Fitzpatrick, Robert
    Perret, Ludovic
    Todo, Yosuke
    Xagawa, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 446 - 464
  • [4] Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices
    Rasslan, Mohamed
    Youssef, Amr
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 853 - 854
  • [5] Cryptanalysis of the Multivariate Encryption Scheme EFLASH
    Oygarden, Morten
    Felke, Patrick
    Raddum, Havard
    Cid, Carlos
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 85 - 105
  • [6] ZHFE, a New Multivariate Public Key Encryption Scheme
    Porras, Jaiberth
    Baena, John
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 229 - 245
  • [7] A Multivariate Public Key Encryption Scheme With Equality Test
    Shen, Xiaoying
    Wang, Licheng
    Zhu, Huijun
    Liu, Yuan
    IEEE ACCESS, 2020, 8 : 75463 - 75472
  • [8] ZHFE, A New Multivariate Public Key Encryption Scheme
    Porras, Jaiberth
    Baena, John
    Ding, Jintai
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 229 - 245
  • [9] CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key
    Duong, Dung Hoang
    Petzoldt, Albrecht
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12): : 2691 - 2698
  • [10] Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
    Coron, JS
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 14 - 27